![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Mathematical theory of computation
This book comprises nine selected works on numerical and computational methods for solving multiobjective optimization, game theory, and machine learning problems. It provides extended versions of selected papers from various fields of science such as computer science, mathematics and engineering that were presented at EVOLVE 2013 held in July 2013 at Leiden University in the Netherlands. The internationally peer-reviewed papers include original work on important topics in both theory and applications, such as the role of diversity in optimization, statistical approaches to combinatorial optimization, computational game theory, and cell mapping techniques for numerical landscape exploration. Applications focus on aspects including robustness, handling multiple objectives, and complex search spaces in engineering design and computational biology.
This book discusses major milestones in Rohit Jivanlal Parikh's scholarly work. Highlighting the transition in Parikh's interest from formal languages to natural languages, and how he approached Wittgenstein's philosophy of language, it traces the academic trajectory of a brilliant scholar whose work opened up various new avenues in research. This volume is part of Springer's book series Outstanding Contributions to Logic, and honours Rohit Parikh and his works in many ways. Parikh is a leader in the realm of ideas, offering concepts and definitions that enrich the field and lead to new research directions. Parikh has contributed to a variety of areas in logic, computer science and game theory. In mathematical logic his contributions have been in recursive function theory, proof theory and non-standard analysis; in computer science, in the areas of modal, temporal and dynamic logics of programs and semantics of programs, as well as logics of knowledge; in artificial intelligence in the area of belief revision; and in game theory in the formal analysis of social procedures, with a strong undercurrent of philosophy running through all his work.This is not a collection of articles limited to one theme, or even directly connected to specific works by Parikh, but instead all papers are inspired and influenced by Parikh in some way, adding structures to and enriching "Parikh-land". The book presents a brochure-like overview of Parikh-land before providing an "introductory video" on the sights and sounds that you experience when reading the book.
This book aims at gathering roboticists, control theorists, neuroscientists, and mathematicians, in order to promote a multidisciplinary research on movement analysis. It follows the workshop " Geometric and Numerical Foundations of Movements " held at LAAS-CNRS in Toulouse in November 2015[1]. Its objective is to lay the foundations for a mutual understanding that is essential for synergetic development in motion research. In particular, the book promotes applications to robotics --and control in general-- of new optimization techniques based on recent results from real algebraic geometry.
This book constitutes the revised selected papers of the 44th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2018, held in Cottbus, Germany, in June 2018. The 30 full papers presented in this volume were carefully reviewed and selected from 66 submissions. They cover a wide range of areas, aiming at connecting theory and applications by demonstrating how graph-theoretic concepts can be applied in various areas of computer science. Another focus is on presenting recent results and on identifying and exploring promising directions of future research.
This is a book about numbers and how those numbers are represented in and operated on by computers. It is crucial that developers understand this area because the numerical operations allowed by computers, and the limitations of those operations, especially in the area of floating point math, affect virtually everything people try to do with computers. This book aims to fill this gap by exploring, in sufficient but not overwhelming detail, just what it is that computers do with numbers. Divided into two parts, the first deals with standard representations of integers and floating point numbers, while the second examines several other number representations. Details are explained thoroughly, with clarity and specificity. Each chapter ends with a summary, recommendations, carefully selected references, and exercises to review the key points. Topics covered include interval arithmetic, fixed-point numbers, big integers and rational arithmetic. This new edition has three new chapters: Pitfalls of Floating-Point Numbers (and How to Avoid Them), Arbitrary Precision Floating Point, and Other Number Systems. This book is for anyone who develops software including software engineers, scientists, computer science students, engineering students and anyone who programs for fun.
Edited in collaboration with FoLLI, the Association of Logic, Language and Information, this book constitutes the refereed proceedings of the 23rd International Conference on Formal Grammar, FG 2018, collocated with the European Summer School in Logic, Language and Information in August 2018. The 7 full papers were carefully reviewed and selected from 11 submissions. The focus of papers are as follows: Formal and computational phonology, morphology, syntax, semantics, and pragmatics Model-theoretic and proof-theoretic methods in linguistics Logical aspects of linguistic structure Constraint-based and resource-sensitive approaches to grammar Learnability of formal grammar Integration of stochastic and symbolic models of grammar Foundational, methodological, and architectural issues in grammar and linguistics Mathematical foundations of statistical approaches to linguistic analysis
This contributed volume offers a collection of papers presented at the 2016 Network Games, Control, and Optimization conference (NETGCOOP), held at the University of Avignon in France, November 23-25, 2016. These papers highlight the increasing importance of network control and optimization in many networking application domains, such as mobile and fixed access networks, computer networks, social networks, transportation networks, and, more recently, electricity grids and biological networks. Covering a wide variety of both theoretical and applied topics in the areas listed above, the authors explore several conceptual and algorithmic tools that are needed for efficient and robust control operation, performance optimization, and better understanding the relationships between entities that may be acting cooperatively or selfishly in uncertain and possibly adversarial environments. As such, this volume will be of interest to applied mathematicians, computer scientists, engineers, and researchers in other related fields.
There have been substantial developments in meshfree methods, particle methods, and generalized finite element methods since the mid 1990s. The growing interest in these methods is in part due to the fact that they offer extremely flexible numerical tools and can be interpreted in a number of ways. For instance, meshfree methods can be viewed as a natural extension of classical finite element and finite difference methods to scattered node configurations with no fixed connectivity. Furthermore, meshfree methods have a number of advantageous features that are especially attractive when dealing with multiscale phenomena: A-priori knowledge about the solution's particular local behavior can easily be introduced into the meshfree approximation space, and coarse scale approximations can be seamlessly refined by adding fine scale information. However, the implementation of meshfree methods and their parallelization also requires special attention, for instance with respect to numerical integration.
This book provides an in-depth study of controlled languages used in technical documents from both a theoretical and practical perspective. It first explores the history of controlled languages employed by the manufacturing industry to shape and constrain the information in technical documents. The author then offers a comparative analysis of existing controlled languages and distills the best-practice features of those language systems. He concludes by offering innovative models that can be used to develop and trial a new controlled language. This book will be of interest to linguists working in technical and professional communication, as well as writers and practitioners involved in the production of technical documents for companies in multiple industries and geographical locations.
This book presents a comprehensive and self-contained treatment of the authors' newly developed scalable algorithms for the solutions of multibody contact problems of linear elasticity. The brand new feature of these algorithms is theoretically supported numerical scalability and parallel scalability demonstrated on problems discretized by billions of degrees of freedom. The theory supports solving multibody frictionless contact problems, contact problems with possibly orthotropic Tresca's friction, and transient contact problems. It covers BEM discretization, jumping coefficients, floating bodies, mortar non-penetration conditions, etc. The exposition is divided into four parts, the first of which reviews appropriate facets of linear algebra, optimization, and analysis. The most important algorithms and optimality results are presented in the third part of the volume. The presentation is complete, including continuous formulation, discretization, decomposition, optimality results, and numerical experiments. The final part includes extensions to contact shape optimization, plasticity, and HPC implementation. Graduate students and researchers in mechanical engineering, computational engineering, and applied mathematics, will find this book of great value and interest.
This book offers an in-depth insight into the general-purpose finite element program MSC Marc, which is distributed by MSC Software Corporation. It is a specialized program for nonlinear problems (implicit solver) which is common in academia and industry. The primary goal of this book is to provide a comprehensive introduction to a special feature of this software: the user can write user-subroutines in the programming language Fortran, which is the language of all classical finite element packages. This subroutine feature allows the user to replace certain modules of the core code and to implement new features such as constitutive laws or new elements. Thus, the functionality of commercial codes ('black box') can easily be extended by linking user written code to the main core of the program. This feature allows to take advantage of a commercial software package with the flexibility of a 'semi-open' code.
Quantum machine learning investigates how quantum computers can be used for data-driven prediction and decision making. The books summarises and conceptualises ideas of this relatively young discipline for an audience of computer scientists and physicists from a graduate level upwards. It aims at providing a starting point for those new to the field, showcasing a toy example of a quantum machine learning algorithm and providing a detailed introduction of the two parent disciplines. For more advanced readers, the book discusses topics such as data encoding into quantum states, quantum algorithms and routines for inference and optimisation, as well as the construction and analysis of genuine ``quantum learning models''. A special focus lies on supervised learning, and applications for near-term quantum devices.
This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data. This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way. This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.
This book constitutes the refereed proceedings of the 12th International Conference on Parallel Computational Technologies, PCT 2018, held in Rostov-on-Don, Russia, in April 2018.The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and technologies; parallel numerical algorithms; supercomputer simulation.
This book explores the most significant computational methods and the history of their development. It begins with the earliest mathematical / numerical achievements made by the Babylonians and the Greeks, followed by the period beginning in the 16th century. For several centuries the main scientific challenge concerned the mechanics of planetary dynamics, and the book describes the basic numerical methods of that time. In turn, at the end of the Second World War scientific computing took a giant step forward with the advent of electronic computers, which greatly accelerated the development of numerical methods. As a result, scientific computing became established as a third scientific method in addition to the two traditional branches: theory and experimentation. The book traces numerical methods' journey back to their origins and to the people who invented them, while also briefly examining the development of electronic computers over the years. Featuring 163 references and more than 100 figures, many of them portraits or photos of key historical figures, the book provides a unique historical perspective on the general field of scientific computing - making it a valuable resource for all students and professionals interested in the history of numerical analysis and computing, and for a broader readership alike.
This book constitutes the proceedings of the 24th International Conference on Computing and Combinatorics, COCOON 2018, held in Qing Dao, China, in July 2018. The 62 papers presented in this volume were carefully reviewed and selected from 120 submissions. They deal with the areas of algorithms, theory of computation, computational complexity, and combinatorics related to computing.
In this book the authors present new results on interpolation for nonmonotonic logics, abstract (function) independence, the Talmudic Kal Vachomer rule, and an equational solution of contrary-to-duty obligations. The chapter on formal construction is the conceptual core of the book, where the authors combine the ideas of several types of nonmonotonic logics and their analysis of 'natural' concepts into a formal logic, a special preferential construction that combines formal clarity with the intuitive advantages of Reiter defaults, defeasible inheritance, theory revision, and epistemic considerations. It is suitable for researchers in the area of computer science and mathematical logic.
This book constitutes the refereed post-conference proceedings of the 29th International Workshop on Combinatorial Algorithms, IWOCA 2018, held in Singapore, Singapore, in July 2018. The 31 regular papers presented in this volume were carefully reviewed and selected from 69 submissions. They cover diverse areas of combinatorical algorithms, complexity theory, graph theory and combinatorics, combinatorial optimization, cryptography and information security, algorithms on strings and graphs, graph drawing and labelling, computational algebra and geometry, computational biology, probabilistic and randomised algorithms, algorithms for big data analytics, and new paradigms of computation.
This graduate textbook provides a unified view of quantum information theory. Clearly explaining the necessary mathematical basis, it merges key topics from both information-theoretic and quantum- mechanical viewpoints and provides lucid explanations of the basic results. Thanks to this unified approach, it makes accessible such advanced topics in quantum communication as quantum teleportation, superdense coding, quantum state transmission (quantum error-correction) and quantum encryption. Since the publication of the preceding book Quantum Information: An Introduction, there have been tremendous strides in the field of quantum information. In particular, the following topics - all of which are addressed here - made seen major advances: quantum state discrimination, quantum channel capacity, bipartite and multipartite entanglement, security analysis on quantum communication, reverse Shannon theorem and uncertainty relation. With regard to the analysis of quantum security, the present book employs an improved method for the evaluation of leaked information and identifies a remarkable relation between quantum security and quantum coherence. Taken together, these two improvements allow a better analysis of quantum state transmission. In addition, various types of the newly discovered uncertainty relation are explained. Presenting a wealth of new developments, the book introduces readers to the latest advances and challenges in quantum information. To aid in understanding, each chapter is accompanied by a set of exercises and solutions.
This textbook helps future data analysts comprehend aggregation function theory and methods in an accessible way, focusing on a fundamental understanding of the data and summarization tools. Offering a broad overview of recent trends in aggregation research, it complements any study in statistical or machine learning techniques. Readers will learn how to program key functions in R without obtaining an extensive programming background. Sections of the textbook cover background information and context, aggregating data with averaging functions, power means, and weighted averages including the Borda count. It explains how to transform data using normalization or scaling and standardization, as well as log, polynomial, and rank transforms. The section on averaging with interaction introduces OWS functions and the Choquet integral, simple functions that allow the handling of non-independent inputs. The final chapters examine software analysis with an emphasis on parameter identification rather than technical aspects. This textbook is designed for students studying computer science or business who are interested in tools for summarizing and interpreting data, without requiring a strong mathematical background. It is also suitable for those working on sophisticated data science techniques who seek a better conception of fundamental data aggregation. Solutions to the practice questions are included in the textbook.
This book constitutes the thoroughly refereed proceedings of the Clausthal-Goettingen International Workshop on Simulation Science, held in Goettingen, Germany, in April 2017. The 16 full papers presented were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on simulation and optimization in networks, simulation of materials, distributed simulations.
This LNAI 1103 constitutes the proceedings of the International Joint Conference on Rough Sets, IJCRS 2018, held in Quy Nhon, Vietnam, in August 2018.The 40 full papers presented together with 5 short papers were carefully reviewed and selected from 61 submissions. The IJCRS conferences aim at bringing together experts from universities and research centers as well as the industry representing fields of research in which theoretical and applicational aspects of rough set theory already find or may potentially find usage.
The European Conference on Numerical Mathematics and Advanced Applications (ENUMATH), held every 2 years, provides a forum for discussing recent advances in and aspects of numerical mathematics and scientific and industrial applications. The previous ENUMATH meetings took place in Paris (1995), Heidelberg (1997), Jyvaskyla (1999), Ischia (2001), Prague (2003), Santiago de Compostela (2005), Graz (2007), Uppsala (2009), Leicester (2011) and Lausanne (2013). This book presents a selection of invited and contributed lectures from the ENUMATH 2015 conference, which was organised by the Institute of Applied Mathematics (IAM), Middle East Technical University, Ankara, Turkey, from September 14 to 18, 2015. It offers an overview of central recent developments in numerical analysis, computational mathematics, and applications in the form of contributions by leading experts in the field.
The papers in this volume represent a broad, applied swath of advanced contributions to the 2015 ICSA/Graybill Applied Statistics Symposium of the International Chinese Statistical Association, held at Colorado State University in Fort Collins. The contributions cover topics that range from statistical applications in business and finance to applications in clinical trials and biomarker analysis. Each papers was peer-reviewed by at least two referees and also by an editor. The conference was attended by over 400 participants from academia, industry, and government agencies around the world, including from North America, Asia, and Europe.
This self-contained essay collection is published to commemorate half a century of Bell's theorem. Like its much acclaimed predecessor "Quantum [Un]Speakables: From Bell to Quantum Information" (published 2002), it comprises essays by many of the worlds leading quantum physicists and philosophers. These revisit the foundations of quantum theory as well as elucidating the remarkable progress in quantum technologies achieved in the last couple of decades. Fundamental concepts such as entanglement, nonlocality and contextuality are described in an accessible manner and, alongside lively descriptions of the various theoretical and experimental approaches, the book also delivers interesting philosophical insights. The collection as a whole will serve as a broad introduction for students and newcomers as well as delighting the scientifically literate general reader. |
![]() ![]() You may like...
Merger Remedies in American and European…
Francois Leveque, Howard Shelanski
Hardcover
R3,203
Discovery Miles 32 030
Extremisms In Africa
Alain Tschudin, Stephen Buchanan-Clarke, …
Paperback
![]()
A Manifesto For Social Change - How To…
Moeletsi Mbeki, Nobantu Mbeki
Paperback
![]()
|